Cybersecurity Operations Analyst II
Piper Companies
Job Overview
Who's the hiring manager?
Sign up to PitchMeAI to discover the hiring manager's details for this job. We will also write them an intro email for you.

Job Description
Cybersecurity Operations Analyst II at Piper Companies
Piper Companies is seeking a Cybersecurity Operations Analyst II to join a growing security operations team responsible for threat detection, incident response, vulnerability management, and continuous improvement of defensive capabilities. This role is ideal for a cybersecurity professional who enjoys hands-on investigative work, owning key functions in a small-team environment, and directly influencing the maturity of a security operations program.
As a Cybersecurity Operations Analyst II, you will serve as a primary escalation point for security alerts, incidents, and threat investigations. You’ll partner closely with IT, business stakeholders, and leadership to ensure systems, data, and users remain secure against evolving threats.
Key Responsibilities
Threat Detection & Investigation
- Monitor and triage alerts from SIEM, EDR, email security, and network monitoring tools.
- Investigate escalated events from MSSPs or automated detections.
- Conduct threat hunting activities leveraging IOCs, suspicious patterns, and cyber threat intelligence.
Incident Response
- Lead response activities for medium-to-high severity security incidents.
- Perform root cause analysis and develop detailed post-incident reports.
- Collaborate with IT and business teams to contain, eradicate, and recover from threats.
Security Tool Management
- Maintain and tune SIEM, EDR, and additional security tools to improve detection accuracy.
- Build and refine custom detection rules, dashboards, alerts, and reporting capabilities.
Vulnerability & Risk Management
- Oversee the vulnerability management lifecycle, including scanning, analysis, prioritization, and remediation tracking.
- Validate and categorize vulnerabilities based on exploitability and business impact.
- Partner with IT teams to provide patching and configuration guidance.
- Ensure timely remediation of identified risks.
Collaboration & Communication
- Serve as liaison between Security Operations and IT/business units.
- Provide technical direction and mentorship to Tier 1 analysts.
- Communicate findings and risk assessments in clear, non-technical language.
Continuous Improvement
- Recommend enhancements to tools, workflows, detection logic, and response procedures.
- Maintain and refine incident response runbooks and escalation guidelines.
Qualifications
Required:
- 5+ years of experience in Security Operations, Incident Response, Threat Detection, or a related field.
- Hands-on experience with SIEM, EDR, and network security technologies.
- Strong understanding of threat actors, attack techniques (MITRE ATT&CK), and security best practices.
- Ability to analyze logs, packets, system telemetry, and behavioral indicators.
- Excellent communication skills, written and verbal.
Preferred:
- Experience working on small or cross-functional security teams.
- Familiarity with cloud environments such as AWS, Azure, or GCP.
- Industry certifications such as Security+, CySA+, GCIH, GCIA, or equivalent.
- Scripting skills in Python, PowerShell, or Bash for automation and tooling.
Compensation:
$120,000-$140,000
Key skills/competency
- Security Operations
- Incident Response
- Threat Detection
- Vulnerability Management
- SIEM (Security Information and Event Management)
- EDR (Endpoint Detection and Response)
- Network Security
- MITRE ATT&CK Framework
- Cyber Threat Intelligence
- Scripting (Python, PowerShell, Bash)
How to Get Hired at Piper Companies
- Research Piper Companies' culture: Study their mission, values, recent news, and employee testimonials on LinkedIn and Glassdoor to understand their approach as a staffing partner.
- Tailor your resume: Customize your resume to highlight extensive experience in security operations, incident response, and threat detection, explicitly mentioning SIEM, EDR, and MITRE ATT&CK.
- Showcase technical expertise: Be prepared to discuss hands-on experience with core security technologies and your ability to analyze logs, packets, and behavioral indicators in detail.
- Prepare for incident response scenarios: Practice articulating your approach to leading medium-to-high severity security incidents, including root cause analysis and recovery strategies.
- Demonstrate communication and mentorship: Highlight experiences where you've communicated complex security findings to non-technical stakeholders and provided technical guidance to junior analysts.
Frequently Asked Questions
Find answers to common questions about this job opportunity
Explore similar opportunities that match your background